Password Authentication Based on Fractal Coding Scheme
暂无分享,去创建一个
[1] Joan Puate,et al. Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.
[2] Tung-Shou Chen,et al. Detecting and restoring the tampered images based on iteration-free fractal compression , 2003, J. Syst. Softw..
[3] Yung-Gi Wu,et al. Fractal image compression with variance and mean , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[4] Michael F. Barnsley,et al. Fractals everywhere , 1988 .
[5] Yuval Fisher. Fractal Image Compression , 1994 .
[6] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[7] B. Jayaram,et al. Retinal Biometrics based Authentication and Key Exchange System , 2011 .
[8] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[9] Carlo Blundo,et al. The Key Establishment Problem , 2001, FOSAD.
[10] Eun-Jun Yoon,et al. A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices , 2007, APWeb/WAIM Workshops.
[11] Manoj Kumar. A New Secure Remote User Authentication Scheme with Smart Cards , 2010, Int. J. Netw. Secur..
[12] Cheng‐Hao Li,et al. Digital watermarking based on fractal image coding , 2000 .
[13] Jason Bock,et al. NET security , 2002 .
[14] M. Barnsley,et al. Iterated function systems and the global construction of fractals , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[15] Roman Jasek,et al. Advanced user authentication process based on the principles of fractal geometry , 2011 .
[16] J. K. Lee,et al. Fingerprint-based remote user authentication scheme using smart cards , 2002 .
[17] Younghwa An,et al. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards , 2012, Journal of biomedicine & biotechnology.
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] Hung-Yu Chien,et al. An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..
[20] Nadia M. G. Al-Saidi,et al. Improved digital signature protocol using iterated function systems , 2011, Int. J. Comput. Math..
[21] Nevenko Zunic,et al. Methods for Protecting Password Transmission , 2000, Comput. Secur..
[22] Nadia M. G. Al-Saidi,et al. A New Approach in Cryptographic Systems Using Fractal Image Coding , 2009 .
[23] A. Jacquin. A fractal theory of iterated Markov operators with applications to digital image coding , 1989 .